I’m studying and need help with a Computer Science question to help me learn.
At the end of the lab, you will be asked to respond to the following in a 2- to 2½-page response at the end of your Microsoft Word document:
- Most network breaches go undetected for weeks or even months, and an attacker usually takes steps to be much more careful than our scans were. With that in mind, write a short paragraph describing how the default Windows® firewall and security settings might contribute to this inability to detect an attacker probing from inside your network.
- This was just a single system on a local LAN. How much more complicated would this process be for 100 computers? What about an enterprise with 10,000 computers on their LAN/WAN?
- Consider a cloud-hosted Infrastructure as a Service (IaaS) environment with many new, Internet-accessible systems regularly being built and brought online. What advantages or challenges might there be protecting such systems from malware and from attack?
- Finally, conclude this week’s assignment with a page explaining how the same types of tools demonstrated in this lab might be used by an infrastructure administrator to help secure an environment.